Active exploitation of Dell RecoverPoint zero-day by China-linked actors; KEV adds four exploited CVEs; APIs emerge as top exploited
Published Feb 18, 2026, 7:53 AM UTC
Key entities
TLDR
Prioritize emergency patching/mitigation of Dell RecoverPoint appliances due to confirmed in-the-wild exploitation by China-linked espionage actors, review CISA KEV’s four newly added actively exploited CVEs for immediate remediation, and expand monitoring on.
Why this matters
Prioritize emergency patching/mitigation of Dell RecoverPoint appliances due to confirmed in-the-wild exploitation by China-linked espionage actors, review CISA KEV’s four newly added actively exploited CVEs for immediate remediation, and expand monitoring on.
What changed
Prioritize emergency patching/mitigation of Dell RecoverPoint appliances due to confirmed in-the-wild exploitation by China-linked espionage actors, review CISA KEV’s four newly added actively exploited CVEs for immediate remediation, and expand monitoring on. Published 2w after the previous Cybersecurity and Critical Infrastructure briefing. Lead angle now centers on Active exploitation of Dell RecoverPoint zero-day by China-linked actors; KEV adds four.
Topic context
Use this page when you need a tighter view of zero-days, ransomware, outage-linked cyber risk, and critical-infrastructure incidents without reading every advisory feed directly. Key angles: ransomware, zero-day, cve-, vulnerability.
Summary
Observed facts: Two independent reports say a zero-day in Dell RecoverPoint is being actively exploited by China-linked threat actors to deploy malware [1][4]. CISA’s KEV update adds four CVEs under confirmed active exploitation, signaling urgent patching priority [2].
Sources
Dell RecoverPoint Zero-Day Exploited by Chinese Cyberespionage Group - SecurityWeek
CISA Flags Four Security Flaws Under Active Exploitation in Latest KEV Update - The Hacker News
New Research Reveals APIs are the Single Most Exploited Attack Surface - martechseries.com
Dell Zero-Day Actively Abused by China-Linked Threat Actors to Install Malware - Cyber Press